Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of the above
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) Test and reevaluate risks
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) People first, technology second
B) Technology first, people second
C) None of the above
D) All of the above
Correct Answer
verified
Multiple Choice
A) Is there clear accountability for information security in our organization?
B) How much is spent on information security and what is it being spent on?
C) What is the impact on the organization of a serious security incident?
D) How do we identify potential insiders?
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Information security plan
B) Information security policies
C) Authentication
D) Biometrics
Correct Answer
verified
Multiple Choice
A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Examines each message that wants entrance to the network
B) Blocks messages without the correct markings from entering the network
C) Detects computers communicating with the Internet without approval
D) All of the above
Correct Answer
verified
Multiple Choice
A) Smart card
B) Token
C) Biometrics
D) Content filtering
Correct Answer
verified
Multiple Choice
A) Distributed denial-of-service attack
B) Worm
C) Denial-of-service attack
D) Backdoor programs
Correct Answer
verified
Showing 61 - 80 of 80
Related Exams